SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Phishing, Pharming,  and the latest potholes  on the Information Highway A Presentation by Ian Loe, CISSP
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object]
Traditional Types of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Latest Types of Malware
What is Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is   Adware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How does Spyware work?   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spyware Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Getting Spyware is Easy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malicious Spyware   Types  (cont…) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Phishing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing Purpose ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bogus Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Out-Scams Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Pharming? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming most alarming threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Challenges ,[object Object],[object Object],[object Object],[object Object]
Spyware Market Place ,[object Object],[object Object],[object Object]
Enterprise Solutions Emerging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Approach - Pharming   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions?
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Firewall
FirewallFirewall
Firewall
 
Security threats
Security threatsSecurity threats
Security threats
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Web security
Web securityWeb security
Web security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
internet security
internet securityinternet security
internet security
 
Web security
Web securityWeb security
Web security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Andere mochten auch

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsCalyptix Security
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

Andere mochten auch (9)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Ähnlich wie Phishing, Pharming, and the latest potholes on the Information Highway

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 

Ähnlich wie Phishing, Pharming, and the latest potholes on the Information Highway (20)

Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 

Mehr von Kevin Lim

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceKevin Lim
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalityKevin Lim
 
Productive Games
Productive GamesProductive Games
Productive GamesKevin Lim
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessKevin Lim
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorKevin Lim
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"Kevin Lim
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"Kevin Lim
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseKevin Lim
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with BlogsKevin Lim
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0Kevin Lim
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected BeingsKevin Lim
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)Kevin Lim
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsKevin Lim
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart WikipediaKevin Lim
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The ClassroomKevin Lim
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationKevin Lim
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)Kevin Lim
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.Kevin Lim
 

Mehr von Kevin Lim (18)

Game Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer ExperienceGame Mechanics: Learning as a Multiplayer Experience
Game Mechanics: Learning as a Multiplayer Experience
 
Social Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortalitySocial Marginalia: How writers and fans give books immortality
Social Marginalia: How writers and fans give books immortality
 
Productive Games
Productive GamesProductive Games
Productive Games
 
The Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousnessThe Social Cyborg: From perfect memory to networked consciousness
The Social Cyborg: From perfect memory to networked consciousness
 
Productive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human BehaviorProductive Games: Using Game Mechanics to Steer Human Behavior
Productive Games: Using Game Mechanics to Steer Human Behavior
 
PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"PRSA: "Social Media - Strategies instead of Tools"
PRSA: "Social Media - Strategies instead of Tools"
 
PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"PRSA: Social Media - "Strategies instead of Tools"
PRSA: Social Media - "Strategies instead of Tools"
 
The Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your CauseThe Obama Way: Using Online Social Networks to Promote Your Cause
The Obama Way: Using Online Social Networks to Promote Your Cause
 
Leveling Up Students with Blogs
Leveling Up Students with BlogsLeveling Up Students with Blogs
Leveling Up Students with Blogs
 
Art of Listening 2.0
Art of Listening 2.0Art of Listening 2.0
Art of Listening 2.0
 
Hyper Connected Beings
Hyper Connected BeingsHyper Connected Beings
Hyper Connected Beings
 
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
The Rise Of Us: Dynamics of Smartmobs (Fall 2008)
 
COM125 Blog & Music Idol Awards
COM125 Blog & Music Idol AwardsCOM125 Blog & Music Idol Awards
COM125 Blog & Music Idol Awards
 
I Heart Wikipedia
I Heart WikipediaI Heart Wikipedia
I Heart Wikipedia
 
Facebook Strategies For The Classroom
Facebook Strategies For The ClassroomFacebook Strategies For The Classroom
Facebook Strategies For The Classroom
 
Seduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participationSeduction Of The Swarm: Understanding patterns of online participation
Seduction Of The Swarm: Understanding patterns of online participation
 
The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)The Rise Of Us (on Collective Intelligence)
The Rise Of Us (on Collective Intelligence)
 
If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.If "blogging" is the dirty word, then I am scum.
If "blogging" is the dirty word, then I am scum.
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Phishing, Pharming, and the latest potholes on the Information Highway

  • 1. Phishing, Pharming, and the latest potholes on the Information Highway A Presentation by Ian Loe, CISSP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.